Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 16 Sep 2018 05:59:09 +0000
From:      bugzilla-noreply@freebsd.org
To:        ports-bugs@FreeBSD.org
Subject:   [Bug 231390] security/heimdal fix for squid gssapi memory leak
Message-ID:  <bug-231390-7788@https.bugs.freebsd.org/bugzilla/>

next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D231390

            Bug ID: 231390
           Summary: security/heimdal fix for squid gssapi memory leak
           Product: Ports & Packages
           Version: Latest
          Hardware: Any
                OS: Any
            Status: New
          Severity: Affects Some People
          Priority: ---
         Component: Individual Port(s)
          Assignee: hrs@FreeBSD.org
          Reporter: dewayne@heuristicsystems.com.au
             Flags: maintainer-feedback?(hrs@FreeBSD.org)
          Assignee: hrs@FreeBSD.org
 Attachment #197124 text/plain
         mime type:

Created attachment 197124
  --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D197124&action=
=3Dedit
kerberos context patch

A conversation on the heimdal-discuss@h5l.org list revealed and fixes a mem=
ory
leak arising from the squid kerberos authentication helper.=20
Search for "Memory leak with Squid negotiate_kerberos_auth helper under Ope=
nBSD
6.3"

I've enclosed the patches that fix this problem, only because the applicati=
on
of the fix and a new release of heimdal may not be as timely as a patch to =
the
"port"; and I created and applied the patch.

--=20
You are receiving this mail because:
You are the assignee for the bug.=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-231390-7788>